225 research outputs found
Security of distributed-phase-reference quantum key distribution
Distributed-phase-reference quantum key distribution stands out for its easy
implementation with present day technology. Since many years, a full security
proof of these schemes in a realistic setting has been elusive. For the first
time, we solve this long standing problem and present a generic method to prove
the security of such protocols against general attacks. To illustrate our
result we provide lower bounds on the key generation rate of a variant of the
coherent-one-way quantum key distribution protocol. In contrast to standard
predictions, it appears to scale quadratically with the system transmittance.Comment: 4 pages + appendix, 4 figure
Unconditional Security of Single-Photon Differential Phase Shift Quantum Key Distribution
In this Letter, we prove the unconditional security of single-photon
differential phase shift quantum key distribution (DPS-QKD) protocol, based on
the conversion to an equivalent entanglement-based protocol. We estimate the
upper bound of the phase error rate from the bit error rate, and show that
DPS-QKD can generate unconditionally secure key when the bit error rate is not
greater than 4.12%. This proof is the first step to the unconditional security
proof of coherent state DPS-QKD.Comment: 5 pages, 2 figures; shorten the length, improve clarity, and correct
typos; accepted for publication in Physical Review Letter
On the geometric distance between quantum states with positive partial transposition and private states
We prove an analytic positive lower bound for the geometric distance between
entangled positive partial transpose (PPT) states of a broad class and any
private state that delivers one secure key bit. Our proof holds for any Hilbert
space of finite dimension. Although our result is proven for a specific class
of PPT states, we show that our bound nonetheless holds for all known entangled
PPT states with non-zero distillable key rates whether or not they are in our
special class.Comment: 16 page
EFEITOS DA RESTRIÇÃO DO FLUXO SANGUÍNEO ASSOCIADA AO EXERCÍCIO DE FORÇA SOBRE O DANO MUSCULAR ESQUELÉTICO E O SISTEMA CARDIOVASCULAR
O dano muscular é considerado um dos principais mediadores das adaptações musculoesqueléticas proporcionadas pelo exercício de força (EF). No entanto, existe a hipótese de que o EF de baixa intensidade (20-50% de 1RM) associado à restrição do fluxo sanguíneo (RFS) possa proporcionar adaptações similares independentemente de ocorrer ou não danos musculares. Esse estudo visou avaliar os efeitos da RFS associada a diferentes protocolos de exercício de força sobre o dano muscular esquelético e o sistema cardiovascular. Foram avaliados três diferentes protocolos experimentais: 1º) Exercício de força excêntrico de alta intensidade (EFEX, 130% de 1RM), no qual os participantes realizaram 3 séries de 10 repetições, sob duas condições (com ou sem a RFS); 2º) Exercício de força de baixa intensidade (EFBI, 40% de 1RM), no qual os participantes realizaram 3 séries até a fadiga muscular, também sob condições com ou sem a RFS; e por último, 3º) Exercício de força de baixa intensidade (EFBI, 40% de 1RM), realizando novamente 3 séries até a fadiga muscular sob diferentes percentuais de RFS (0, 40, 60 e 80%). Para o protocolo experimental 1, observamos que a amplitude do movimento articular (ADM) diminuiu em ambas as condições imediatamente pós-exercício, mas somente a condição EFEX apresentou ADM reduzida 24h pós-exercício. A dor muscular à palpação (DMP) aumentou em ambas as condições, mas para a condição EFEX+RFS a dor muscular retornou para valores basais 48 horas pós-exercício. A circunferência do braço (CIR) aumentou somente para a condição EFEX. Para as respostas hemodinâmicas, observamos aumento somente da frequência cardíaca (FC) imediatamente pós-exercício, similar para ambas as condições. Para o protocolo experimental 2, observamos que os marcadores de dano muscular (contração isométrica voluntária máxima (CIVM), a ADM, a dor muscular à palpação, a CIR, e os níveis plasmáticos da creatina quinase (CK) e da lactato desidrogenase (LDH)) se alteraram significativamente pós-exercício em ambas as condições, mas de maneira mais expressivas para a condição de exercício sem a RFS (EFBI). Em relação as respostas cardiovasculares, observamos aumentos similares para pressão arterial sistólica (PAS), diastólica (PAD), média (PAM) e na FC no momento pós-exercício. Finalmente, no protocolo experimental 3, observamos que a CIVM, o limiar de dor à pressão (LDP), a ADM e a CIR sofreram alterações imediatamente após a sessão de exercício em todos os grupos. Além disso, observamos que os valores dos biomarcadores de dano muscular analisados (CK, LDH e o cell-free DNA) se elevaram mais na condição de exercício sem a RFS (EFBI). Sobre as respostas cardiovasculares, observamos que a PAS se elevou imediatamente após o exercício em todos os grupos. Já a PAD e a PAM se elevou para os grupos EF+RFS60 e EF+RFS80 (p<0,05), mostrando que as respostas cardiovasculares foram mais exacerbadas a medida que maiores percentuais de RFS fossem utilizadas. Concluindo que a RFS apresenta potencial efeito em atenuar o dano muscular e que essa resposta é proporcional à intensidade da RFS aplicada. No entanto, a RFS pode promover maior demanda cardiovascular durante protocolos de exercícios de força de baixa intensidade
Error tolerance of two-basis quantum key-distribution protocols using qudits and two-way classical communication
We investigate the error tolerance of quantum cryptographic protocols using
-level systems. In particular, we focus on prepare-and-measure schemes that
use two mutually unbiased bases and a key-distillation procedure with two-way
classical communication. For arbitrary quantum channels, we obtain a sufficient
condition for secret-key distillation which, in the case of isotropic quantum
channels, yields an analytic expression for the maximally tolerable error rate
of the cryptographic protocols under consideration. The difference between the
tolerable error rate and its theoretical upper bound tends slowly to zero for
sufficiently large dimensions of the information carriers.Comment: 10 pages, 1 figur
Passive sources for the Bennett-Brassard 1984 quantum key distribution protocol with practical signals
Most experimental realizations of quantum key distribution are based on the
Bennett-Brassard 1984 (so-called BB84) protocol. In a typical optical
implementation of this scheme, the sender uses an active source to produce the
required BB84 signal states. While active state preparation of BB84 signals is
a simple and elegant solution in principle, in practice passive state
preparation might be desirable in some scenarios, for instance, in those
experimental setups operating at high transmission rates. Passive schemes might
also be more robust against side-channel attacks than active sources. Typical
passive devices involve parametric down-conversion. In this paper, we show that
both coherent light and practical single photon sources are also suitable for
passive generation of BB84 signal states. Our method does not require any
external-driven element, but only linear optical components and photodetectors.
In the case of coherent light, the resulting key rate is similar to the one
delivered by an active source. When the sender uses practical single photon
sources, however, the distance covered by a passive transmitter might be longer
than the one of an active configuration.Comment: 14 pages, 11 figure
Numerical simulations of mixed states quantum computation
We describe quantum-octave package of functions useful for simulations of
quantum algorithms and protocols. Presented package allows to perform
simulations with mixed states. We present numerical implementation of important
quantum mechanical operations - partial trace and partial transpose. Those
operations are used as building blocks of algorithms for analysis of
entanglement and quantum error correction codes. Simulation of Shor's algorithm
is presented as an example of package capabilities.Comment: 6 pages, 4 figures, presented at Foundations of Quantum Information,
16th-19th April 2004, Camerino, Ital
- …